Behavioral task
behavioral1
Sample
80606700ff09c925bd4a56cc687aa91f_JaffaCakes118.doc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
80606700ff09c925bd4a56cc687aa91f_JaffaCakes118.doc
Resource
win10v2004-20240226-en
General
-
Target
80606700ff09c925bd4a56cc687aa91f_JaffaCakes118
-
Size
138KB
-
MD5
80606700ff09c925bd4a56cc687aa91f
-
SHA1
2efea78b94f3555993986a7c2fc13fdc47e68703
-
SHA256
afb95c94e6873c86590d0ab3bdf56bd83b1ada211fcc8b413fba54d244471ce3
-
SHA512
e2f04930f801dde5f7a5810b14990424c82daed90bbf904a44bfe00fc4b2da3059737deed9abfe00bd5d77c72a58509461ebb504ef0f1bff96bec99bede0b637
-
SSDEEP
1536:nA81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadP+apoQ7EVu2GuehlW/:A8GhDS0o9zTGOZD6EbzCdyQwVHe7W/
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
80606700ff09c925bd4a56cc687aa91f_JaffaCakes118.doc windows office2003
GARczMqm